Analysis
-
max time kernel
355s -
max time network
381s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 13:18
Behavioral task
behavioral1
Sample
b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe
Resource
win7-20221111-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe
Resource
win10v2004-20221111-en
7 signatures
150 seconds
General
-
Target
b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe
-
Size
216KB
-
MD5
79b58f50dc76ec667a996e8fe2af3d14
-
SHA1
b68a4cdfc2093955b6692b10c7a5888e6c695d1c
-
SHA256
b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e
-
SHA512
dce0e40b98c62bfadb3dc2c7964465d8dd1bd03b0e8bd817ebca9c7ebdc6a19a56890b1d5d505967fcb563446718c507b1bc6afee16343d18f5b6e48e3b8c74d
-
SSDEEP
3072:+37TFytkq+usgdZRK3w4AkF3M1NToHtbrZf:+37ctlO+P4j3ST4tbrZf
Score
8/10
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/2136-132-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2136-133-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2136 set thread context of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe Token: SeDebugPrivilege 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe Token: SeDebugPrivilege 2696 iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2016 IEXPLORE.EXE 2016 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 2136 wrote to memory of 4580 2136 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 80 PID 4580 wrote to memory of 2696 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 86 PID 4580 wrote to memory of 2696 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 86 PID 4580 wrote to memory of 2696 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 86 PID 2696 wrote to memory of 2016 2696 iexplore.exe 87 PID 2696 wrote to memory of 2016 2696 iexplore.exe 87 PID 2016 wrote to memory of 1216 2016 IEXPLORE.EXE 88 PID 2016 wrote to memory of 1216 2016 IEXPLORE.EXE 88 PID 2016 wrote to memory of 1216 2016 IEXPLORE.EXE 88 PID 4580 wrote to memory of 2696 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 86 PID 4580 wrote to memory of 2696 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 86 PID 4580 wrote to memory of 1216 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 88 PID 4580 wrote to memory of 1216 4580 b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe"C:\Users\Admin\AppData\Local\Temp\b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exeC:\Users\Admin\AppData\Local\Temp\b0bc1edee90f531e87fd46fa4729366c5e4cd46507f98f8ef97188fca8f45c8e.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2016 CREDAT:17410 /prefetch:25⤵PID:1216
-
-
-
-